A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
[
{
"vendor": "n/a",
"product": "kernel",
"versions": [
{
"version": "kernel 5.17 rc3",
"status": "affected"
}
]
}
]
packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html
bugzilla.redhat.com/show_bug.cgi?id=2051505
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
lists.debian.org/debian-lts-announce/2022/03/msg00011.html
lists.debian.org/debian-lts-announce/2022/03/msg00012.html
security.netapp.com/advisory/ntap-20220419-0002/
www.debian.org/security/2022/dsa-5095
www.debian.org/security/2022/dsa-5096